May 2024

Datadog Event Management helps teams reduce alert fatigue
Datadog released IT Event Management to its suite of AIOps capabilities. With Event Management, Datadog intelligently consolidates, correlates and enriches all alert events …

Forescout AI enables security leaders to make confident, informed decisions
Forescout introduced its AI product strategy built to help business leaders and security operators synthesize connected device threats and make decisions with clarity and …

Sumo Logic’s analytics capabilities allow security teams to find insights within their data
Sumo Logic announced new AI and security analytics capabilities that allow security and development teams to align around a single source of truth and collect and act on data …

Elastic’s Search AI to transform SOCs with AI-driven SIEM solutions
Elastic has announced that Search AI will replace the traditional SIEM with an AI-driven security analytics solution for the modern SOC. Powered by the Search AI platform, …

Code42 unveils source code exfiltration detection and protection capabilities
Code42 has advanced its Incydr data protection product with new capabilities to see and stop source code leak and theft and ensure organizations can prevent potential …

Arctic Wolf Cyber Resilience Assessment helps organizations advance business resilience
Arctic Wolf released the Arctic Wolf Cyber Resilience Assessment, a risk assessment tool designed to help businesses of almost any size advance their cyber resilience and …

Trellix Database Security protects sensitive data
Trellix announced an enhanced Trellix Database Security, available immediately. Trellix Database Security strengthens customers’ overall security posture by protecting …

6 tips to implement security gamification effectively
There’s not a CISO in the industry who’s not aware of the extremely short median CISO tenure. That’s why the best CISOs are those who constantly seek ways to strengthen their …

Cybercrime stats you can’t ignore
In this article, you will find excerpts from various reports that offer stats and insights about the current cybercrime landscape. Behavioral patterns of ransomware groups are …

The strategic advantages of targeted threat intelligence
In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every …

Ransomware activity is back on track despite law enforcement efforts
Despite significant disruptions for high-profile ransomware gangs LockBit and BlackCat, Q1 2024 became the most active first quarter ever recorded — a 21% increase over Q1 …

Only 45% of organizations use MFA to protect against fraud
Most businesses struggle with identity verification and have concerns over ability to protect against AI, according to Ping Identity. Despite stronger protection solutions …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM